splice:

Cybersecurity for Operational Technology

What is Splice?

SPLICE combines a number of advanced machine learning, security and networking concepts to secure legacy OT/ICS/SCADA and modern I-IoT sensor environments. SPLICE has been specifically designed to require no or minimal reconfiguration and interruption to existing production processes. An encrypted overlay network is established to abstract the OT network in converged OT/IT environments. This is done without requiring any addressing changes on field equipment, HMI's or controllers, and allows for logical isolation and control enhancements (such as authentication offloading, microservice injection and vulnerability shielding) to be built into the network core.

SPLICE provides access control, behavioral profiling, Intrusion Detection, and forensic audit trail of all OT control network traffic. SPLICE allows you to take back control over insecure API's. Vulnerability Shielding techniques are used to encapsulate and strengthen insecure API's. Powerful machine learning algorithms and deep packet tag analysis are used to detect anomalous communication between OT devices.

Cybersplice for OT security and IoT security: the logical alternative to air-gaps

Quick intro

Applications

SCADA

SPLICE enables sensitive real world interfacing devices to co-exist securely inside existing IT networks.

ICS

SPLICE overcomes device and controller vulnerabilities by building vulnerability shielding, authentication, authorisation and access controls into the network layer.

Embedded

SPLICE logically isolates targets in an encrypted overlay network for centralised profiling, segregation and Intrusion Detection.

I-IoT

With SPLICE there is no need to touch the actual equipment or code.

 

Vulnerability Shielding

IT security practices do not always translate well for OT security or IoT security purposes. For various reasons, it may not be viable to patch vulnerabilities in HMI's and PLC's.

SPLICE provides a way to mitigate these vulnerabilities through Vulnerability Shielding by injecting authentication code into the existing communication flow. When a sensitive function is accessed, SPLICE takes over from the normal application flow and requests OTP or password verification before forwarding the request through to the HMI. Using Vulnerability Shielding, Role Based Access Control (with or without two factor authentication) can be built into legacy applications without touching the application code. Vulnerability Shielding works with both legacy and AJAX/websockets based applications.

Latest news

15 December, 2018

Sharpshooter targeting Critical Infrastructure

New campaigh targeting nuclear and critical infrastructure.   Attributio n is difficult.
Administrator
16 November, 2018

Siemens Industrial Firewall vulnerabilities

False sense of security?   Good to see a patch available  
Administrator
16 November, 2018

Hacking construction cranes

How much of a consideration was security during the software design process?   Opportunity for some serious damage here  
Administrator
21 August, 2018

IT malware shuts down Taiwan Semiconductor Manufacturing Plants

Collateral damage or targeted OT attack?   TSMC says variant of WannaCry virus brought down its plants | ZDNet  
Administrator
21 August, 2018

The Sensors That Power Smart Cities are a Hacker's Dream

Smart city sensor hubs are riddled with vulnerabilities:   The Sensors That Power Smart Cities Are a Hacker's Dream  
Administrator
21 August, 2018

ICS Honeypots targeted by criminal hackers

Is this the new type of ransomware attack?  This honeypot was actively targeted by what appears to be criminal organization.   Cybercriminals waste no time breaking into experimental...
Administrator
20 March, 2018

Destructive Petrochemical Plant cyberattack thwarted

The motivation behind this attack appears to be intentionally destructive   http://www.nytimes.com/2018/03/15/technology/saudi-arabia-hacks-cyberattacks.html
Administrator
12 February, 2018

Cryptocurrency Malware Mining Attack on ICS systems

Water Utility in Europe Hit by Cryptocurrency Malware Mining Attack   http://www.eweek.com/security/water-utility-in-europe-hit-by-cryptocurrency-malware-mining-attack
Administrator

View all blog entries